Enumerate in brief about the intranet security policy, Computer Engineering

Assignment Help:

Enumerate in brief about the Intranet security policy

An Intranet security policy is a very broad topic and it cannot be covered easily in few pages since it differs from situation to situation, there are some general principles that can be found similar in almost all policies. Some of them are as follows:

  • Identification of
  • The content, and needs to be secured
  • User groups or categories
  • Procedures
  • Access authorisation procedure
  • Backup procedures
  • Disaster recovery procedures
  • Action against misuse
  • Course of action in the event of misuse or attacks
  • Ensuring employees exercise proper etiquette so that they do not misrepresent the company
  • Handling sensitive or secured documents stored on the intranet site
  • Copyright policies for intellectual properties developed by the company.

 


Related Discussions:- Enumerate in brief about the intranet security policy

Convert the following binary numbers into hexadecimal, Q. Convert the follo...

Q. Convert the following BINARY numbers into HEXADECIMAL, double check by converting the result HEXADECIMAL to BINARY. a) 1101.0110 b) 1011.11010 c) 11110.01011

Classical approach - canonical genetic algorithm, Classical approach - Cano...

Classical approach - Canonical genetic algorithm: However returning to the classical approach, as there example, whether solving a particular problem involved finding a set of

Sequential logic gates - sr flip flop, Sequential Logic Gates SR flip ...

Sequential Logic Gates SR flip flop                                                                                                                    1)

Java, what is inheritence and all types in java?

what is inheritence and all types in java?

Additions of two numbers by using 2’s complement, Add -20 to +26 by using 2...

Add -20 to +26 by using 2's complement ? Ans. Firstly convert the both numbers 20 and 26 in its 8-bit binary equivalent and determine the 2's complement of 20, after that add -

Validate the xml document , As an XML expert you are needed to model a syst...

As an XML expert you are needed to model a system for an online furniture shop. After an interview with the shop manager you have the certain information: The detail of th

What is a piconet in a bluetooth context, Problem: (a) IEEE802.11 supp...

Problem: (a) IEEE802.11 supports two types of network architecture, describe these architectures with the support of diagrams detailing the network components. (b) The MAC

Discuss the important characteristics of 8237, Question 1 Discuss the w...

Question 1 Discuss the working principle of an interrupt and hardware actions in interrupt handling 2 Discuss the important characteristics of 8237 3 Describe the format

A switch statement , Which is more efficient, a switch statement or an if e...

Which is more efficient, a switch statement or an if else chain? Ans) The differences, if any, are likely to be small. The switch statement was designed to be efficiently impl

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd